DNSteal alternatives
Looking for an alternative tool to replace DNSteal? During the review of DNSteal we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- DET (data loss prevention testing)
- AIL framework (framework to parse data of information leaks)
- GitMiner (Git data miner)
These tools are ranked as the best alternatives to DNSteal.
Alternatives (by score)
DET
Introduction
This tool can be used to identify possible DLP failures. It uses different data exfiltration techniques, which could (or not) trigger a DLP solution.
Project details
DET is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Learning
- Penetration testing
AIL framework
Introduction
AIL is a modular framework which helps to analyze potential information leaks. The framework is flexible and supports different kinds of data formats and sources. For example, one of the sources is the collection of pastes from Pastebin. A tool like AIL is commonly used to detect or even prevent data leaks.
Project details
AIL framework is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Data extraction
- Data leak detection
- Information leak detection
- Security monitoring
GitMiner
Introduction
GitMiner is a tool to scan for sensitive data that is leaked via software repositories. Examples of sensitive data are authentication details such as passwords or connection settings.
Project details
GitMiner is written in Python.
Strengths and weaknesses
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- Asset discovery
- Discovery of sensitive information
- Information leak detection
git-secrets
Introduction
You would most likely use git-secrets in development teams or as an individual developer. The primary goal is to prevent accidentally submitting authentication details or otherwise sensitive information to your software repositories.
Project details
git-secrets is written in shell script.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data leak prevention
- Information leak prevention
DNSChef
Introduction
DNSChef is a DNS proxy that can be used terminate or intercept traffic for DNS traffic. This might be useful during a penetration test or when researching malware and manipulate the actual DNS responses.
Project details
Fierce
Introduction
Fierce is a security tool that helps with DNS reconnaissance. It can locate non-contiguous IP space, but using DNS information.Project details
Fierce is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Information gathering
- Reconnaissance
- Security assessment
QuickScan
Introduction
Although there are many port scanning utilities, sometimes it is specific functionality that makes a tool really powerful. For example, QuickScan saves the results of a scan, which then can be processed later for follow-up.
Project details
QuickScan is written in Python.
Strengths and weaknesses
- + Very low number of dependencies
- + The source code of this software is available
- - No releases on GitHub available
- - Full name of author is unknown
Typical usage
- Network scanning
SubBrute (subdomain-bruteforcer)
Introduction
SubBrute is a DNS meta-query spider that enumerates DNS records and subdomains. This can be useful during penetration tests and security assessments.Project details
SubBrute is written in Python.
Strengths and weaknesses
- + More than 1000 GitHub stars
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Information gathering
- Penetration testing
- Security assessment
SubFinder
Introduction
SubFinder is a tool to scan domains and discover subdomains. This may be useful during the reconnaissance phase of penetration testing where information is collected. Some subdomains may reveal sensitive data or point to interesting targets such as a backup location.
Project details
SubFinder is written in Golang.
Strengths and weaknesses
- + Tool is modular and extendable
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Discovery of sensitive information
- Information gathering
- Penetration testing
- Reconnaissance
- Security assessment
aiodnsbrute (Async DNS Brute)
Introduction
When a project requires resolving or guessing host names, then this tool is a great addition to the toolkit. It focuses on 'fast' by using asynchronous operations. The list of names to try is provided with a wordlist.
Project details
aiodnsbrute is written in Python.
Strengths and weaknesses
- + Very low number of dependencies
- + The source code of this software is available
Typical usage
- Network scanning
- Penetration testing
OpenStego
Introduction
OpenStego can be used to exfiltrate data or find unauthorized usage.
Project details
OpenStego is written in Java.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data hiding
- Watermarking
pastemon
Introduction
Tool like pastemon can detect specific texts on the Pastebin website, like corporate information or sensitive information. It can be used as an early warning system or detect compromises in your environment.
Project details
pastemon is written in Perl.
Strengths and weaknesses
- + The source code of this software is available
- - Unknown project license
Typical usage
- Security monitoring
Acra
Introduction
Acra is a database encryption proxy that provides encryption and data leakage prevention to applications. It provides selective encryption, access control, database and data leak prevention, and even intrusion detection capabilities. It is focused on developers and supports most popular programming languages such as Go, PHP, Python, Ruby.
Project details
Acra is written in Golang, Node.js, Objective-C, PHP, Python, Ruby.
Strengths and weaknesses
- + Commercial support available
- + The source code of this software is available
Typical usage
- Data encryption
- Data leak prevention
- Data security
- Vulnerability mitigation
BuQuikker
Introduction
BuQuikker is a security tool to scan the Amazon S3 storage service. Its goal is to find open and unprotected S3 buckets.Project details
BuQuikker is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data leak detection
- Security assessment
SMBMap
Introduction
SMBMap allows scanning of file resources that are shared with the SMB protocol. The tool will list share drives, drive permissions, the share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. The tool was created for pentesters to simplify finding sensitive data, or at least test for it.
Project details
SMBMap is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data leak detection
- Information gathering
- Penetration testing
gitleaks
Introduction
Gitleaks scans the repository, including history, for secrets and other sensitive data. This can be useful for both developers as security professionals to discover any leaks.
Project details
gitleaks is written in Golang.
Strengths and weaknesses
- + More than 10 contributors
- + More than 3000 GitHub stars
- + The source code of this software is available
Typical usage
- Security assessment
Some relevant tool missing as an alternative to DNSteal? Please contact us with your suggestion.